Limin Liu

ORCID: 0009-0004-0913-1127
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Advanced Malware Detection Techniques
  • Semantic Web and Ontologies
  • Network Security and Intrusion Detection
  • Radar Systems and Signal Processing
  • Wireless Signal Modulation Classification
  • Embedded Systems Design Techniques
  • Interconnection Networks and Systems
  • Software Testing and Debugging Techniques
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Biomedical Text Mining and Ontologies
  • Spam and Phishing Detection
  • Security and Verification in Computing
  • Remote Sensing and LiDAR Applications
  • Image and Signal Denoising Methods
  • Advanced Image and Video Retrieval Techniques
  • Chaos-based Image/Signal Encryption
  • Advanced Computational Techniques and Applications
  • Cryptographic Implementations and Security
  • Cloud Data Security Solutions
  • Privacy-Preserving Technologies in Data
  • Service-Oriented Architecture and Web Services
  • Financial Risk and Volatility Modeling
  • Advanced Computing and Algorithms
  • Neural Networks and Applications

PLA Army Engineering University
2018-2025

Guangdong University of Petrochemical Technology
2023

Institute of Information Engineering
2013-2022

Chinese Academy of Sciences
2010-2022

Shijiazhuang University
2022

Changchun University
2021-2022

Data Assurance and Communication Security
2014-2021

University of Chinese Academy of Sciences
2021

Ningbo Polytechnic
2020

Henan Normal University
2019

To address the issue of outlier removal in remote sensing image feature matching, a novel algorithm, local-angular-length coherence constraint (LALC), based on geometric is proposed. This approach leverages positional relationship between adjacent inliers to reformulate problem as identifying consistent structures. First, by using local constraint, K-nearest neighbours (KNN) structure can be constructed, and vectors obtained. Subsequently, analysing across images, both angular length...

10.1080/01431161.2025.2471594 article EN International Journal of Remote Sensing 2025-03-27

Since the day it was proposed, return-oriented programming has shown to be an effective and powerful attack technique against write or execute only (W ⊕ X) protection. However, a general belief in previous research is, systems deployed with address space randomization where executables are also randomized at run-time able defend programming, as addresses of all instructions randomized. In this paper, we show that due weakness current technique, there still ways launching attacks those...

10.1109/trustcom.2011.9 article EN 2011-11-01

Android Application Framework is an integral and foundational part of the system. Each 1.4 billion devices relies on system services to manage applications resources. Given its critical role, a vulnerability in framework can be exploited launch large-scale cyber attacks cause severe harms user security privacy. Recently, many vulnerabilities were exposed, showing that it vulnerable exploitable. However, most existing research has been limited analyzing applications, while there are very few...

10.1145/3081333.3081361 article EN 2017-06-16

Nowadays, deep learning has been widely used. In natural language learning, the analysis of complex semantics achieved because its high degree flexibility. The deceptive opinions detection is an important application area in model, and related mechanisms have given attention researched. On-line are quite short, varied types content. order to effectively identify opinions, we need comprehensively study characteristics explore novel besides textual emotional polarity that used text analysis....

10.48550/arxiv.1711.09181 preprint EN other-oa arXiv (Cornell University) 2017-01-01

Artificial Intelligence (AI) frees humans from the heavy calculation burden in science and engineering.The AI can analyze mass data on classroom behavior backend of intelligent teaching platforms, extract useful features student behaviors class.Based feature fusion, this paper develops a novel method to class participation, which correlates participation with behaviors.Firstly, basic for analysis were processed, including records online video, relevant formulas constructed.After that,...

10.18280/ria.340316 article EN Revue d intelligence artificielle 2020-06-30

10.1023/a:1008682210559 article EN Distributed and Parallel Databases 1999-01-01

Purpose The purpose of this paper is to summarize the existing point cloud target detection algorithms based on deep learning, and provide reference for researchers in related fields. In recent years, with its outstanding performance 2D images, learning technology has been applied light ranging (LiDAR) data improve automation intelligence level detection. However, there are still some difficulties room improvement from 3D cloud. paper, vehicle LiDAR method chosen as research subject....

10.1108/sr-01-2022-0022 article EN Sensor Review 2022-08-22

As an advanced component of embedded systems, SoC issues excellent performance in size, reliability and operating efficiency. Its application is popular. mainly composed some computing cores IP modules. design concerned to cooperation hardware HW software SW. In this paper, a method HW-SW co-design for discussed. example, the display modules issued. The solution based on FPGA with VHDL software. Simulation test show that function replaced by hardware. With new modules, can be written more...

10.1109/ccie.2010.27 article EN 2010-01-01

Controlled vocabularies have been used as the means for unifying disparate terminologies found within an application field. This unification leads to better administration of information and enhanced communication among various parties. Semantic networks shown be excellent vehicles modeling controlled vocabularies. However, they often lack necessary access flexibility robustness required by external agents such intelligent information-locators decision-support systems. In this paper, we...

10.1145/238355.238484 article EN 1996-01-01

Radio frequency (RF) stealth is one of the essential research hotspots in radar field. The anti-sorting signal an important direction RF signal. Theoretically speaking, design based on failure principle sorting algorithm, and SDIF algorithm a core widely used engineering. Thus, this paper, first analyzed detail. It pointed out that threshold function will fail when pulse repetition interval (PRI) value obeys distribution whose length 20 times larger than minimum PRI. Secondly, correctness...

10.3390/electronics11111777 article EN Electronics 2022-06-03

Radio frequency (RF) stealth anti-sorting technology is a research hotspot in the radar field. In this study, signal design principles of anti-cluster and anti-SDIF sorting were investigated for processes clustering pre-sorting sequence-difference-histogram main sorting. Then, accordance with principle, 2D interleaving feedback hyperchaotic system based on cosine-exponential was designed. A method to modulate pulse repetition interval (PRI) parameters carrier wide intervals through...

10.3390/e24091283 article EN cc-by Entropy 2022-09-12

Radio frequency (RF) stealth anti-sorting technology can improve the battlefield survival rate of radar and is one research hotspots in field. In this study, signal design principle anti-sequential difference histogram (SDIF) sorting was explored for main algorithm SDIF. Furthermore, we designed a piecewise linear chaotic system with interval number parameterization based on random disturbance proposed method to modulate repetition period widely spaced pulses using system. Then, considering...

10.3390/e24111559 article EN cc-by Entropy 2022-10-29

Cluster ensemble is an effective method to improve the effect in data clustering, but results of existing cluster algorithms are usually not so good when they process mixed attributes datas, main reason that still dispersed. To solve this problem, paper presents a new weighted algorithm based on graph theory. It first clusters datasets and gets members, then sets weights each object with proposed function, determines relationship between data-pair by setting edges them, it can get nearest...

10.1109/trustcom.2011.210 article EN 2011-11-01

Controlled vocabularies (CVs) are networks of concepts that unify disparate terminologies and facilitate the process information sharing within an application domain. We describe a general methodology for representing existing CV as object-oriented database (OODB), called vocabulary repository (OOVR). A formal description OOVR methodology, which is based on structural abstraction technique, given, along with algorithmic number theorems pertaining to some methodology's characteristics. An...

10.1109/tkde.2002.1019218 article EN IEEE Transactions on Knowledge and Data Engineering 2002-07-01

China has been one of the countries with biggest manufacturing industry in world. An advanced or a world-class is pursued target for Chinese industries. can be set up through modern automation systems. And system built multi-layer network structure, which includes ERP, MES and FCS. All three layers are depended on embedded systems technology practice. This paper to focus analyzing relationship between systems, discussing influence their networks development an manufacturing, especially China.

10.1109/ccie.2010.28 article EN 2010-01-01

Randomness and fuzziness are two fundamental kinds of uncertain phenomena, which can be handled respectively by probability theory (sigma system) possibility (max system). For many practical problems information processing, random uncertainty may often co-exist with fuzzy uncertainty, reminds us to look for a novel mechanism called sigma-max hybrid inference. This cope randomness jointly achieve direct fusion heterogeneous modeled or possibility. Specifically, we interested in typical forms...

10.1016/j.ins.2020.12.054 article EN cc-by Information Sciences 2020-12-29

Recently, multiantenna spectrum sensing (MSS) using de-ep neural network has received much attention. However, most of them are not explicitly formulated to account for non-circular sources. In practice, the primary users' signals may come from either circular or noncircular sources, both. We are, therefore, motivated investigate MSS problem hybrid and source in cognitive radio. Specifically, we first introduce augmented sample covariance matrix (ASCM) exploit additional statistical...

10.1109/lsens.2023.3330109 article EN IEEE Sensors Letters 2023-11-03

In view of the slowness and locality convergence for basic genetic algorithm (BGA short) in solving complex optimization problems, we proposed an improved named self-adpative multi-population composite (SM-CGA short), gave structure implementation steps algorithm; then consider its global under elitist preserving strategy using Markov chain theory, analyze performance through three examples from different aspects. All results indicate that new possess interesting advantages such as better...

10.1109/icmlc.2009.5212122 article EN International Conference on Machine Learning and Cybernetics 2009-07-01

Light detection and ranging (LiDAR) point clouds are sparse, unstructured, disordered; hence, traditional convolutional neural networks unsuitable for direct application in point-cloud data processing. Graph convolution (GCNs) can be used to process having the aforementioned characteristics; however, they inefficient when adjacent relationship of cloud is uncertain adjacency-matrix elements abundant. To solve these problems, a ground filtering method based on superpoint graph network (SPGCN)...

10.1117/1.jrs.16.016512 article EN Journal of Applied Remote Sensing 2022-03-25

Motion estimation is the most important step in video compression. Most of current compression systems use forward motion estimation, where information derived at encoder and sent to decoder over channel. Backward does not derive an explicit representation encoder. Instead, implicitly embeds alternative subspace. recently, algorithm that adopts least-square prediction (LSP) for backward has shown great potential further improve coding efficiency. Forward have both their advantages...

10.1117/12.704676 article EN Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE 2007-01-28

This paper managed to induce probability theory (sigma system) and possibility (max respectively from randomness fuzziness, through which the premature of is expected be well founded. Such an objective achieved by addressing three open key issues: a) lack clear mathematical definitions fuzziness; b) intuitive definition possibility; c) abstraction procedure axiomatic probability/possibility their definitions. Especially, last issue involves question why axiom "maxitivity" adopted for...

10.48550/arxiv.2110.07722 preprint EN other-oa arXiv (Cornell University) 2021-01-01

Clustering ensemble selection has been confirmed that it can always achieve better result than traditional clustering algorithms. However, many selective algorithms cannot eliminate the inferior quality partitions' influence and accuracy of is not high. In order to solve problems, paper proposes a new algorithm. The algorithm, firstly, uses validity evaluation evaluate all available partitions selects best as reference partition; secondly, defines strategy via diversity; lastly, adaptive...

10.1504/ijaacs.2015.069570 article EN International Journal of Autonomous and Adaptive Communications Systems 2015-01-01
Coming Soon ...